Identification of the family to which a malware specimen belongs is esse...
Since thermal imagery offers a unique modality to investigate pain, the ...
Convolutional layers have long served as the primary workhorse for image...
In this paper, we propose cuSLINK, a novel and state-of-the-art reformul...
Differential privacy (DP) is the prevailing technique for protecting use...
The robustness of modern machine learning (ML) models has become an
incr...
For a variety of biometric cross-spectral tasks, Visible-Thermal (VT) fa...
When investigating a malicious file, searching for related files is a co...
Concept erasure aims to remove specified features from a representation....
In recent years, self-attention has become the dominant paradigm for seq...
LASSO regularized logistic regression is particularly useful for its bui...
How do large language models (LLMs) develop and evolve over the course o...
Linear L_1-regularized models have remained one of the simplest and most...
Thermal facial imagery offers valuable insight into physiological states...
The machine learning security community has developed myriad defenses fo...
Subsampling algorithms are a natural approach to reduce data size before...
In this paper, we explore the use of metric learning to embed Windows PE...
Sequence processing has long been a central area of machine learning
res...
Multitask prompted finetuning (MTF) has been shown to help large languag...
We present a framework to statistically audit the privacy guarantee conf...
The quantification of uncertainty is important for the adoption of machi...
Due to the computational cost of running inference for a neural network,...
Many metric learning tasks, such as triplet learning, nearest neighbor
r...
Data augmentation has been rare in the cyber security domain due to tech...
Generating and editing images from open domain text prompts is a challen...
As reproducibility becomes a greater concern, conferences have largely
c...
The field of bibliometrics, studying citations and behavior, is critical...
Cancer patients experience high rates of chronic pain throughout the
tre...
The workshop will focus on the application of AI to problems in cyber
se...
We explore the utility of information contained within a dropout based
B...
Ordinal regression is a classification task where classes have an order ...
As artificial intelligence (AI) technologies become increasingly powerfu...
Although groups of strongly correlated antivirus engines are known to ex...
Learning to understand grounded language, which connects natural languag...
Malware family classification is a significant issue with public safety ...
In some problem spaces, the high cost of obtaining ground truth labels
n...
The ability to transfer adversarial attacks from one model (the surrogat...
Holographic Reduced Representations (HRR) are a method for performing
sy...
The detection of malware is a critical task for the protection of comput...
Thermal images reveal medically important physiological information abou...
The use of Machine Learning has become a significant part of malware
det...
K-Means++ and its distributed variant K-Means have become de facto tools...
High-performance primitives for mathematical operations on sparse vector...
Strong empirical evidence that one machine-learning algorithm A outperfo...
There has been increasing concern within the machine learning community ...
Recent works within machine learning have been tackling inputs of
ever-i...
Ordering the selection of training data using active learning can lead t...
False positives (FPs) have been an issue of extreme importance for anti-...
With the increased attention on thermal imagery for Covid-19 screening, ...
Yara rules are a ubiquitous tool among cybersecurity practitioners and
a...